1,815 research outputs found

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    Secure Communications in Millimeter Wave Ad Hoc Networks

    Get PDF
    Wireless networks with directional antennas, like millimeter wave (mmWave) networks, have enhanced security. For a large-scale mmWave ad hoc network in which eavesdroppers are randomly located, however, eavesdroppers can still intercept the confidential messages, since they may reside in the signal beam. This paper explores the potential of physical layer security in mmWave ad hoc networks. Specifically, we characterize the impact of mmWave channel characteristics, random blockages, and antenna gains on the secrecy performance. For the special case of uniform linear array (ULA), a tractable approach is proposed to evaluate the average achievable secrecy rate. We also characterize the impact of artificial noise in such networks. Our results reveal that in the low transmit powerregime, the use of low mmWave frequency achieves better secrecy performance, and when increasing transmit power, a transition from low mmWave frequency to high mmWave frequency is demanded for obtaining a higher secrecy rate. More antennas at the transmitting nodes are needed to decrease the antenna gain obtained by the eavesdroppers when using ULA. Eavesdroppers can intercept more information by using a wide beam pattern. Furthermore, the use of artificial noise may be ineffective for enhancing the secrecy rate.Comment: Accepted by IEEE Transactions on Wireless Communication

    A comprehensive survey of wireless body area networks on PHY, MAC, and network layers solutions

    Get PDF
    Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted

    Physical Layer Security in Wireless Ad Hoc Networks Under A Hybrid Full-/Half-Duplex Receiver Deployment Strategy

    Full text link
    This paper studies physical layer security in a wireless ad hoc network with numerous legitimate transmitter-receiver pairs and eavesdroppers. A hybrid full-/half-duplex receiver deployment strategy is proposed to secure legitimate transmissions, by letting a fraction of legitimate receivers work in the full-duplex (FD) mode sending jamming signals to confuse eavesdroppers upon their information receptions, and letting the other receivers work in the half-duplex mode just receiving their desired signals. The objective of this paper is to choose properly the fraction of FD receivers for achieving the optimal network security performance. Both accurate expressions and tractable approximations for the connection outage probability and the secrecy outage probability of an arbitrary legitimate link are derived, based on which the area secure link number, network-wide secrecy throughput and network-wide secrecy energy efficiency are optimized respectively. Various insights into the optimal fraction are further developed and its closed-form expressions are also derived under perfect self-interference cancellation or in a dense network. It is concluded that the fraction of FD receivers triggers a non-trivial trade-off between reliability and secrecy, and the proposed strategy can significantly enhance the network security performance.Comment: Journal paper, double-column 12 pages, 9 figures, accepted by IEEE Transactions on Wireless Communications, 201

    MH-REACH-Mote: supporting multi-hop passive radio wake-up for wireless sensor network

    Get PDF
    A passive wake-up radio in a wireless sensor network (WSN) has the advantage of increasing network lifetime by using a wake-up radio receiver (WuRx) to eliminate unnecessary idle listening. A sensor node equipped with a WuRx can operate in an ultra-low-power sleep mode, waiting for a trigger signal sent by the wake-up radio transmitter (WuTx). The passive WuRx is entirely powered by the energy harvested from radio transmissions sent by the WuTx. Therefore, it has the advantage of not consuming any energy locally, which would drain the sensor node's battery. Even so, the high amount of energy required to wake up a passive WuRx by a WuTx makes it difficult to build a multi-hop passive wake-up sensor network. In this paper, we describe and discuss our implementation of a battery-powered sensor node with multi-hop wake-up capability using passive WuRxs, called MH-REACH-Mote (Multi-hop-Range EnhAnCing energy Harvester-Mote). The MH-REACH-Mote is kept in an ultra-low-power sleep mode until it receives a wake-up trigger signal. Upon receipt, it wakes up and transmits a new trigger signal to power other passive WuRxs. We evaluate the wake-up range and power consumption of an MH-REACH-Mote through a series of field tests. Results show that the MH-REACH-Mote enables multi-hop wake-up capabilities for passive WuRxs with a wake-up range of 9.4m while requiring a reasonable power consumption for WuTx functionality. We also simulate WSN data collection scenarios with MH-REACH-Motes and compare the results with those of active wake-up sensor nodes as well as a low power listening approach. The results show that the MH-REACH-Mote enables a longer overall lifetime than the other two approaches when data is collected infrequently.Peer ReviewedPostprint (author's final draft
    • …
    corecore